25 terms

Terms 2

When deploying Active Directory with third-party DNS, the DNS server must support _____ records.
What is the command-line utilities allows moving objects from one location to another?
Active Directory supports _____ FSMO roles and their functionality is divided between domain-wide and forest-wide FSMOs.
The _____________ command-line tool is a valuable tool for testing resource access permissions.
Which type of group can be used to grant or deny permissions to any resource located in any domain in a forest.
Global group
When a user logs on to Active Directory, an _________________ is created that identifies the user and all of the user's group memberships.
access token
The first ______________ installed in a new Active Directory forest will hold all of the FSMO roles.
An object is defined in the ___________ of Active Directory.
Active Directory uses _____________ that allow users to access resources in a single domain forest or multiple domain forests.
trust relationships
____________________ of Windows Server 2008 allows enterprises to migrate their down-level Active Directory domain controllers gradually.
Functional levels
Active Directory __________________ are the means by which administrators can control the replication traffic.
Each DC maintains a local value called an _____________ that keeps track of changes that are made at each DC.
update sequence number (USN)
The _____________ of Active Directory defines the logical grouping of Active Directory resources, consisting of forests, domains, trees, and OUs.
logical structure
Which of the following is used to keep track of the number of times Active Directory attribute has been changed.
Version ID
Which of the following protocols should be only used when replicating between different domains over an extremely slow link.
Simple mail transfer protocol (SMTP)
_________________ is the process of confirming a user's identity on a network by using his or her user name and password unlike ______________, which is the process of confirming that the user has the correct permissions to access a resource.
Authentication, authorization
The Primary Domain Controller (PDC) Emulator is not responsible for the following tasks.
Managing objects by providing ease of accessibility and fault tolerance to GPOs
Each DC can have only _______ relative identifier (RID) master.
Which of the following allows users to log on to domains across a forest by using a standardized naming format, similar to what is used in an e-mail address.
User Principal Names (UPNs)
Which of the following FSMO roles manages password changes, account lockouts, and time synchronization for a domain.
PDC Emulator
Which of the following password examples best meets the characteristics of a strong password.
Which of the following command-line utilities can be used to create, modify, delete, and view Active Directory objects and is useful when used in a batch file.
When an FSMO role is unavailable, in the ____________ the outage will be only be noticeable when an administrator attempts to add or remove a DC.
Domain Naming Master
The ________________ feature allows Active Directory to support a decentralized administration model, giving administrators control over certain portions of a domain without affecting the rest of the structure.
Delegate Authority
When planning an OU strategy for your network, which of the following should be considered as the main reason for creating an OU structure.
Representing the functional or geographical model of your company